A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO).

Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?



Answer :

Other Questions